Penetration Testing with Kali Linux
PWK - Copyright © 2023 OffSec Services Limited. All rights reserved.
33
Conversely, it’s been our experience that many of the best penetration testers and web
application hackers are those who have had extensive exposure to defending networks, building
web applications, or administrating systems.
3.2
Threats and Threat Actors
This Learning Unit covers the following Learning Objectives:
•
Understand how attackers and defenders learn from each other
•
Understand the differences between risks, threats, vulnerabilities, and exploits
•
List and describe different classes of threat actors
•
Recognize some recent cybersecurity attacks
•
Learn how malicious attacks and threats can impact an organization and individuals
The term
cybersecurity
came to mainstream use from a military origin. For clarity, we’ll use
cybersecurity to describe the protection of access and information specifically on the Internet or
other digital networks. While included within the broader context of cybersecurity, information
security also examines the protection of physical information-storing assets, such as physical
servers or vaults.
As we explore various threats and threat actors throughout this Module, we’ll mainly consider
their online capabilities. Therefore, we’ll generally use the term cybersecurity here, but won’t be
too concerned about using information security as a synonym.
3.2.1
The Evolution of Attack and Defense
Cybersecurity can be especially fascinating because it involves multiple agents trying to achieve
mutually exclusive outcomes. In the most basic example, a defender wants to control access to
an asset they own, and an attacker wants to gain control over the same asset. This is interesting
because both roles, defender and attacker, subsist on the continued persistence of the other. In
Yüklə
Dostları ilə paylaş: